How to respond to a healthcare data breach

The cause is as important as the solution


When dealing a data breach, it's important for healthcare facilities to understand the cause of the breach, and not just work towards a solution, according to an article on the Healthcare IT Security website.

For instance, analyzing logs will allow a healthcare facility to look deep inside of its network and understand the flow of data and quickly analyze which part of the infrastructure was breached and then better understand why. 

Also, risk within an environment should be weighted based on the type of system and what data it houses. If a small part of the environment gets breached, what risk does it pose? 

New  security solutions allow a facility to find the root cause of a breach. An analytics approach can examine failures within the network related to configurations, patch levels and updates. 

Read the article.

 

 



January 10, 2018


Topic Area: Security


Recent Posts

Severe Winter Weather: What Healthcare Facilities Must Prioritize

Prioritizing critical systems and strategies is key to protecting patients, staff and operations during severe winter weather.


Recovery Centers of America Opens New Facility in Florida

Spanning 19 acres, the campus will include seven buildings, a pond, an outdoor recreation area with a pool, a full basketball court and a rock-climbing wall.


Munson Healthcare Caught Up in Third-Party Data Breach

The vendor has determined through an investigation that, at least as early as January 22, 2025, an unauthorized third party gained access to personal health information.


From Downtime to Data: Rethinking Restroom Reliability in Healthcare

Manufacturers discuss the operational issues plaguing healthcare restrooms and how to shift maintenance from reactive to resilient.


LeChase Building Four-Story Addition to UHS Delaware Valley Hospital

It will consolidate services into a state-of-the-art Medical Neighborhood.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.